CompTIA Security+ SY0-601 – Question740

In a rush to meet an end-of-year business goal, the IT department was told to implement a new business application. The security engineer reviews the attributes of the application and decides the time needed to perform due diligence is insufficient from a cybersecurity perspective. Which of the following BEST describes the security engineer's response?


A.
Risk tolerance
B. Risk acceptance
C. Risk importance
D. Risk appetite

Correct Answer: B

CompTIA Security+ SY0-601 – Question739

Which of the following ensures an organization can continue to do business with minimal interruption in the event of a major disaster?


A.
Business recovery plan
B. Incident response plan
C. Communication plan
D. Continuity of operations plan

Correct Answer: D

CompTIA Security+ SY0-601 – Question738

Following a recent security breach, an analyst discovered that user permissions were added when joining another part of the organization but were not removed from existing groups. Which of the following policies would help to correct these issues in the future?


A.
Service accounts
B. Account audits
C. Password complexity
D. Lockout policy

Correct Answer: B

CompTIA Security+ SY0-601 – Question737

An employee recently resigned from a company. The employee was responsible for managing and supporting weekly batch jobs over the past five years. A few weeks after the employee resigned, one of the batch jobs failed and caused a major disruption. Which of the following would work best to prevent this type of incident from reoccurring?


A.
Job rotation
B. Retention
C. Outsourcing
D. Separation of duties

Correct Answer: A

CompTIA Security+ SY0-601 – Question736

A local business was the source of multiple instances of credit card theft. Investigators found that most payments at this business were made at self-service kiosks. Which of the following is the most likely cause of the exposed credit card Information?


A.
Insider threat
B. RAT
C. Backdoor
D. Skimming
E. NFC attack

Correct Answer: D

CompTIA Security+ SY0-601 – Question734

DRAG DROP
A data owner has been tasked with assigning proper data classifications and destruction methods for various types of data contained within the environment.

INSTRUCTIONS
From the options below, drag each item to its appropriate classification as well as the MOST appropriate form of disposal.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Select and Place:

Correct Answer:

CompTIA Security+ SY0-601 – Question731

HOTSPOT
You are a security administrator investigating a potential infection on a network.
INSTRUCTIONS
Click on each host and firewall. Review all logs to determine which host originated the infection and then identify if each remaining host is clean or infected.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Hot Area:

Correct Answer: